Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'ttool' = '%WINDIR%\9129837.exe'
- %WINDIR%\9129837.exe
- <SYSTEM32>\cmd.exe /c ""<Текущая директория>\abcdefg.bat" "<Полный путь к вирусу>""
- <SYSTEM32>\cscript.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\options[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\cmd[1]
- %WINDIR%\new_drv.sys
- %WINDIR%\9129837.exe
- <Текущая директория>\abcdefg.bat
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\options[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\cmd[1]
- 'in.###stat12.com':80
- 'localhost':1036
- in.###stat12.com/cgi-bin/cmd.cgi?us#################################################################################################
- in.###stat12.com/cgi-bin/options.cgi?us#################################################################################################
- in.###stat12.com/cgi-bin/cert.cgi
- in.###stat12.com/cgi-bin/pstore.cgi
- DNS ASK in.###stat12.com
- ClassName: 'Indicator' WindowName: ''